кароч, совет: программируйте во время компиляции
http://matt.might.net/articles/perl-by-example/
хорошо написано, побольше б такого
https://www.youtube.com/watch?v=06pYoFNG5lU&html5=true
пруф или не было
https://github.com/jshint/jshint/issues/424
https://github.com/jshint/jshint/pull/425
ппц канеш, везде какие-то приколюхи, аж мешать работает
http://blogerator.ru/page/dpi-anatomija-kitajskogo-interneta-cenzura-filtracija
было?..
tl;dr интервью с аноном из китайского /pr
* SECURITY UPDATE: remote crash in yahoo via incorrect char encoding
- debian/patches/CVE-2012-6152.patch: validate strings as utf-8
before parsing in libpurple/protocols/yahoo/{libymsg,yahoo_aliases,
yahoo_filexfer,yahoo_friend,yahoo_picture,yahoochat}.c.
- CVE-2012-6152
* SECURITY UPDATE: crash via bad XMPP timestamp
- debian/patches/CVE-2013-6477.patch: properly handle invalid
timestamps in libpurple/{conversation,log,server}.c.
- CVE-2013-6477
* SECURITY UPDATE: crash via hovering pointer over long URL
- debian/patches/CVE-2013-6478.patch: set max lengths in
pidgin/gtkimhtml.c.
- CVE-2013-6478
* SECURITY UPDATE: remote crash via HTTP response parsing
- debian/patches/CVE-2013-6479.patch: don't implicitly trust
Content-Length in libpurple/util.c.
- CVE-2013-6479
* SECURITY UPDATE: remote crash via yahoo P2P message
- debian/patches/CVE-2013-6481.patch: perform bounds checking in
libpurple/protocols/yahoo/libymsg.c.
- CVE-2013-6481
* SECURITY UPDATE: crashes via MSN NULL pointer dereferences
- debian/patches/CVE-2013-6482.patch: fix NULL pointers in
libpurple/protocols/msn/{msg,oim,soap}.c.
- CVE-2013-6482
* SECURITY UPDATE: iq reply spoofing via incorrect from verification
- debian/patches/CVE-2013-6483.patch: verify from field on iq replies
in libpurple/protocols/jabber/{iq.*,jabber.c,jutil.*}.
- CVE-2013-6483
* SECURITY UPDATE: crash via response from STUN server
- debian/patches/CVE-2013-6484.patch: validate len in libpurple/stun.c.
- CVE-2013-6484
* SECURITY UPDATE: buffer overflow in chunked HTTP response parsing
- debian/patches/CVE-2013-6485.patch: limit chunk size in
libpurple/util.c.
- CVE-2013-6485
* SECURITY UPDATE: buffer overflow in gadu-gadu HTTP parsing
- debian/patches/CVE-2013-6487.patch: limit length in
libpurple/protocols/gg/lib/http.c.
- CVE-2013-6487
* SECURITY UPDATE: buffer overflow in MXit emoticon parsing
- debian/patches/CVE-2013-6489.patch: check return code in
libpurple/protocols/mxit/markup.c.
- CVE-2013-6489
* SECURITY UPDATE: buffer overflow in SIMPLE header parsing
- debian/patches/CVE-2013-6490.patch: use g_new in
libpurple/protocols/simple/simple.c and check length in
libpurple/protocols/simple/sipmsg.c.
- CVE-2013-6490
* SECURITY UPDATE: crash via IRC argument parsing
- debian/patches/CVE-2014-0020.patch: fix arg handling in
libpurple/protocols/irc/msgs.c, fix counts in
libpurple/protocols/irc/parse.c.
- CVE-2014-0020
tl;dr плейнсиблядки в очередной раз поели говна. ппц канеш
оставил 29 проебанных вкладок, из них:
u hostovoj vindy sluchilsya BSOD (3-j raz za nedelyu)
stabilno
kak raz za paru minut pered vazhnoj prezentaciej
gost' virtualki projebal nahuj VSIO
projebalis nastrojki Unity (i ramki okoshek)
projebalsa profil FF (dohuja nenuzhnih vkladok (net, "Restore previous session" ne rabotaet))
projebalas raskladka klaviatury (i ne dobavliajetsa)
udobno